CVE-2025-30367: WeGIA SQL Injection Vulnerability in nextPage Parameter

Executive Summary

CVE-2025-30367 is a critical SQL Injection vulnerability affecting WeGIA, a web manager for charitable institutions. The vulnerability resides in the nextPage parameter of the /WeGIA/controle/control.php endpoint. Unauthenticated attackers can exploit this flaw to manipulate SQL queries, potentially gaining access to sensitive database information, including table names and records, and even modifying or deleting data. Versions of WeGIA prior to 3.2.6 are affected. The vulnerability has a CVSS v4.0 base score of 10.0, indicating its critical severity.

Technical Details

  • Vulnerability: SQL Injection (CWE-89)
  • CVE ID: CVE-2025-30367
  • Affected Software: WeGIA
  • Affected Versions: Versions prior to 3.2.6
  • Vulnerable Parameter: nextPage
  • Vulnerable Endpoint: /WeGIA/controle/control.php
  • Attack Vector: Network
  • Privileges Required: None
  • User Interaction: None
  • CVSS v4.0 Score: 10.0 (Critical)
  • CVSS v4.0 Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

The vulnerability exists because the nextPage parameter in the /WeGIA/controle/control.php endpoint is not properly sanitized before being used in an SQL query. This allows an attacker to inject arbitrary SQL code into the query, leading to various malicious outcomes.

The specific vulnerable URL structure is:

WeGIA/controle/control.php?metodo=listarUm&nomeClasse=SaudeControle&nextPage=<payload>&id=1

The metodo parameter is set to listarUm, nomeClasse to SaudeControle, id to 1, and the nextPage parameter is where the malicious SQL injection payload is inserted.

Root Cause Analysis

The root cause of CVE-2025-30367 lies in the insufficient input validation and sanitization of the nextPage parameter within the listarUm() function of the SaudeControle.php file. The application directly incorporates the user-supplied nextPage value into a header() function call, which is executed after potentially querying the database. While the database query itself might not be directly vulnerable (depending on how $id is handled), the redirection target is directly influenced by user input, creating an opportunity for exploitation.

The original code in controle/SaudeControle.php lacked proper validation of the nextPage parameter before using it in a header() redirection. This allowed attackers to inject malicious code into the URL, leading to SQL injection or other vulnerabilities.

<?php
    // ... other code ...

    public function listarUm()
    {
        extract($_REQUEST);

        $cache = new Cache();
        $infSaude = $cache->read($id);

        if (!$infSaude) {
            try {
                $SaudeDAO=new SaudeDAO();
                $infSaude=$SaudeDAO->listar($id);
                session_start();
                $_SESSION['id_fichamedica']=$infSaude;
                $cache->save($id, $infSaude, '1 seconds');
                header('Location:'.$nextPage);
            } catch (PDOException $e) {
                echo $e->getMessage();
            }
        }
        else{
            header('Location:'.$nextPage);
        }
    }

    // ... other code ...
?>

In this code snippet, the $nextPage variable, directly extracted from the $_REQUEST array without any sanitization or validation, is used in the header('Location:'.$nextPage) function. This allows an attacker to control the redirection target and potentially inject malicious SQL queries.

Patch Analysis

The patch addresses the SQL Injection vulnerability by implementing proper input validation and sanitization for the nextPage parameter. The patch introduces a regular expression to validate the nextPage parameter against a whitelist of allowed URLs. Additionally, the htmlspecialchars() function is used to escape any potentially malicious characters in the validated URL before using it in the header() function.

The following diff shows the changes made to controle/SaudeControle.php:

--- a/controle/SaudeControle.php
+++ b/controle/SaudeControle.php
@@ -148,113 +163,114 @@ public function alterarImagem()
         $SaudeDAO = new SaudeDAO();
         try {
             $SaudeDAO->alterarImagem($id_fichamedica, $imagem);
-            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=".$id_fichamedica);
+            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=" . $id_fichamedica);
         } catch (PDOException $e) {
             echo $e->getMessage();
         }
-        
     }
 
     /**
      * Instancia um objeto do tipo Saude que recebe informações do formulário de cadastro e chama os métodos de DAO e Controller necessários para que uma ficha médica nova seja criada.\n
      */
-    public function incluir(){\n
+    public function incluir()\n
+    {\n
         $saude = $this->verificar();\n
         $texto_descricao = $saude->getTexto();\n
 \n
         $saudeDao = new SaudeDAO();\n
         $descricao = new DescricaoControle();\n
 \n
-        try{\n
+        try {\n
             $saudeDao->incluir($saude);\n
             $descricao->incluir($texto_descricao);\n
 \n
-            $_SESSION[\'msg\']="Ficha médica cadastrada com sucesso!";\n
-            $_SESSION[\'proxima\']="Cadastrar outra ficha.";\n
-            $_SESSION[\'link\']="../html/saude/cadastro_ficha_medica.php";\n
+            $_SESSION[\'msg\'] = "Ficha médica cadastrada com sucesso!";\n
+            $_SESSION[\'proxima\'] = "Cadastrar outra ficha.";\n
+            $_SESSION[\'link\'] = "../html/saude/cadastro_ficha_medica.php";\n
             header("Location: ../html/saude/informacao_saude.php");\n
-            \n
-        }catch(PDOException $e){\n
-            $msg= "Não foi possível registrar o paciente <form> <input type=\'button\' value=\'Voltar\' onClick=\'history.go(-1)\'> </form>"."<br>".$e->getMessage();\n
+
+        } catch (PDOException $e) {\n
+            $msg = "Não foi possível registrar o paciente <form> <input type=\'button\' value=\'Voltar\' onClick=\'history.go(-1)\'> </form>" . "<br>" . $e->getMessage();\n
             echo $msg;\n
         }\n
     }\n
-    \n
+
     public function alterarInfPessoal()\n
     {\n
         extract($_REQUEST);\n
         // $paciente = new Saude(\'\',$nome,$sobrenome,$sexo,$nascimento,\'\',\'\',\'\',\'\',\'\',$tipoSanguineo,\'\',\'\',$imagem,\'\',\'\',\'\',\'\',\'\',\'\',\'\',\'\');\n
-        $paciente = new Saude(\'\',\'\',\'\',\'\',\'\',\'\',\'\',\'\',\'\',\'\',$tipoSanguineo,\'\',\'\',\'\',\'\',\'\',\'\',\'\',\'\',\'\',\'\',\'\');\n
+        $paciente = new Saude(\'\', \'\', \'\', \'\', \'\', \'\', \'\', \'\', \'\', \'\', $tipoSanguineo, \'\', \'\', \'\', \'\', \'\', \'\', \'\', \'\', \'\', \'\', \'\');\n
         $paciente->setId_pessoa($id_fichamedica);\n
         //echo $funcionario->getId_Funcionario();\n
-        $SaudeDAO=new SaudeDAO();\n
+        $SaudeDAO = new SaudeDAO();\n
         try {\n
             $SaudeDAO->alterarInfPessoal($paciente);\n
-            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=".$id_fichamedica);\n
+            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=" . $id_fichamedica);\n
         } catch (PDOException $e) {\n
             echo $e->getMessage();\n
         }\n
-        \n
     }\n
 
     /**
      * Pega as informações do formulário de edição do prontuário e instancia um objeto do tipo DescricaoControle, chamando o método alterarProntuario e passando as informações necessárias, caso a alteração seja bem sucedida redireciona o usuário para a página de exibição das informações do paciente.\n
      */
-    public function alterarProntuario(){\n
-       \n
+    public function alterarProntuario()\n
+    {\n
+
         extract($_REQUEST);\n
 \n
         $descricao = new DescricaoControle();\n
-        try{\n
+        try {\n
             $descricao->alterarProntuario($id_fichamedica, $textoProntuario);\n
-            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=".$id_fichamedica);\n
-        }catch(PDOException $e){\n
+            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=" . $id_fichamedica);\n
+        } catch (PDOException $e) {\n
             echo $e->getMessage();\n
         }\n
     }\n
 
     /**
      * Extraí os dados da requisição e instancia um objeto SaudeDAO, em seguida chama a função adicionarProntuarioAoHistorico passando os parâmetros $id_fichamedica e $id_paciente, redireciona o usuário para a página profile_paciente.php e atribuí uma string para a varivável msg da sessão.\n
      */
-    public function adicionarProntuarioAoHistorico(){\n
+    public function adicionarProntuarioAoHistorico()\n
+    {\n
         extract($_REQUEST);\n
         session_start();\n
         $saudeDao = new SaudeDAO();\n
-        try{\n
+        try {\n
             $saudeDao->adicionarProntuarioAoHistorico($id_fichamedica, $id_paciente);\n
-            $_SESSION[\'msg\']="Prontuário público adicionado ao histórico com sucesso";\n
-            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=".$id_fichamedica);\n
-        }catch(Error $e){\n
+            $_SESSION[\'msg\'] = "Prontuário público adicionado ao histórico com sucesso";\n
+            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=" . $id_fichamedica);\n
+        } catch (Error $e) {\n
             $erro = $e->getMessage();\n
-            $_SESSION[\'msg\']="Ops! Ocorreu o seguinte erro ao tentar inserir o prontuário público: $erro";\n
-            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=".$id_fichamedica);\n
+            $_SESSION[\'msg\'] = "Ops! Ocorreu o seguinte erro ao tentar inserir o prontuário público: $erro";\n
+            header("Location: ../html/saude/profile_paciente.php?id_fichamedica=" . $id_fichamedica);\n
         }\n
     }\n
 
     /**
      * Recebe como parâmetro o id de um paciente, instancia um objeto do tipo SaudeDAO e chama o método listarProntuariosDoHistorico passando o id do paciente informado, em caso de sucesso retorna os prontuários do histórico e em caso de falha da um echo na mensagem do erro.\n
      */
-    public function listarProntuariosDoHistorico($idPaciente){\n
+    public function listarProntuariosDoHistorico($idPaciente)\n
+    {\n
         $saudeDao = new SaudeDAO();\n
 \n
-        try{\n
+        try {\n
             $prontuariosHistorico = $saudeDao->listarProntuariosDoHistorico($idPaciente);\n
             return $prontuariosHistorico;\n
-        }catch(PDOException $e){\n
+        } catch (PDOException $e) {\n
             echo $e->getMessage();\n
         }\n
-        \n
     }\n
 
     /**
      * Pode receber ou não o id de uma ficha médica do histórico, em caso negativo pega a informação do \'idHistorico\' da requisição do tipo GET que o chamou. \n
      * \n
      * Instancia um objeto do tipo SaudeDAO e chama o método listarDescricoesHistoricoPorId passando o id da ficha médica do histórico, em caso de sucesso faz um echo do JSON das descrições, em caso de falha da um echo na mensagem do erro.\n
      */
-    public function listarProntuarioHistoricoPorId($idHistorico = -1){\n
+    public function listarProntuarioHistoricoPorId($idHistorico = -1)\n
+    {\n
         header(\'Content-Type: application/json\');\n
-     \n
-        if($idHistorico == -1){\n
+
+        if ($idHistorico == -1) {\n
             $idHistorico = $_GET[\'idHistorico\'];\n
         }\n
@@ -266,5 +282,4 @@ public function listarProntuarioHistoricoPorId($idHistorico = -1){\n
             echo $e->getMessage();\n
         }\n
     }\n
-   \n-}\n\\ No newline at end of file\n+}\n

--- a/controle/SaudeControle.php
+++ b/controle/SaudeControle.php
@@ -108,18 +108,24 @@
 
     public function listarUm()
     {
-        extract($_REQUEST);
+        $id = filter_input(INPUT_GET, 'id', FILTER_SANITIZE_NUMBER_INT);
+        $nextPage = trim(filter_input(INPUT_GET, 'nextPage', FILTER_SANITIZE_URL));
+
+        $regex = '#^(\.\./html/saude/(aplicar_medicamento|historico_paciente|profile_paciente)\.php(\?id_fichamedica=\d+)?)$#';
 
         $cache = new Cache();
         $infSaude = $cache->read($id);
 
         if (!$infSaude) {
             try {
-                $SaudeDAO=new SaudeDAO();
-                $infSaude=$SaudeDAO->listar($id);
+                $SaudeDAO = new SaudeDAO();
+                $infSaude = $SaudeDAO->listar($id);
                 session_start();
-                $_SESSION['id_fichamedica']=$infSaude;
+                $_SESSION['id_fichamedica'] = $infSaude;
                 $cache->save($id, $infSaude, '1 seconds');
-                header('Location:'.$nextPage);
+
+                if(preg_match($regex, $nextPage)){
+                    header('Location:' . htmlspecialchars($nextPage));
+                }else{
+                    header('Location:' . '../html/home.php');
+                }
             } catch (PDOException $e) {
                 echo $e->getMessage();
             }
@@ -127,7 +133,11 @@
         else{
             header('Location:'.$nextPage);
         }
+            if(preg_match($regex, $nextPage)){
+                header('Location:' . htmlspecialchars($nextPage));
+            }else{
+                header('Location:' . '../html/home.php');
+            }
         }
     }
 

Explanation of the Patch:

  1. Input Filtering: The patch uses filter_input() with FILTER_SANITIZE_NUMBER_INT to sanitize the id parameter, ensuring it's an integer. It also uses FILTER_SANITIZE_URL to sanitize the nextPage parameter.
  2. Regular Expression Validation: A regular expression $regex is defined to match allowed URL patterns for the nextPage parameter. This regex whitelists specific files within the /html/saude/ directory, such as aplicar_medicamento.php, historico_paciente.php, and profile_paciente.php, and allows an optional id_fichamedica parameter with a numeric value.
  3. preg_match() for Whitelisting: The preg_match() function is used to check if the $nextPage parameter matches the defined regular expression. This ensures that only URLs matching the whitelist are allowed.
  4. htmlspecialchars() for Output Encoding: The htmlspecialchars() function is used to escape any potentially malicious characters in the $nextPage parameter before using it in the header() function. This prevents XSS attacks by encoding special characters like <, >, &, " and '.
  5. Fallback Redirection: If the $nextPage parameter does not match the regular expression, the code redirects the user to a safe default page (../html/home.php).

This patch effectively mitigates the SQL Injection vulnerability by validating and sanitizing the nextPage parameter, preventing attackers from injecting malicious code into the URL.

Exploitation Techniques

An attacker can exploit this vulnerability by crafting a malicious URL that injects SQL code into the nextPage parameter. This can be achieved by using tools like sqlmap or by manually crafting the URL.

Proof of Concept (PoC) using sqlmap:

The provided PoC demonstrates how an attacker can use sqlmap to exploit the SQL Injection vulnerability and dump the entire database information from WeGIA.

sqlmap -u "https://comfirewall.wegia.org:8000/WeGIA/controle/control.php?metodo=listarUm&nomeClasse=SaudeControle&nextPage=../html/saude/profile_paciente.php?id_fichamedica=1&id=1" --dbms=mysql --cookie="_ga_F8DXBXLV8J=GS1.1.1733782455.11.1.1733782568.60.0.0; _ga=GA1.1.552051356.1730893405; PHPSESSID=tc79og6t5lr33d4tjv7ct1o9pg" --dump

This command tells sqlmap to:

  • -u: Target the specified URL.
  • --dbms=mysql: Specify that the database is MySQL.
  • --cookie: Provide the necessary session cookies for authentication (if required).
  • --dump: Dump the entire database.

Attack Scenario:

  1. An attacker identifies the vulnerable endpoint /WeGIA/controle/control.php and the nextPage parameter.

  2. The attacker crafts a malicious URL with an SQL injection payload in the nextPage parameter. For example:

    /WeGIA/controle/control.php?metodo=listarUm&nomeClasse=SaudeControle&nextPage=../html/saude/profile_paciente.php?id_fichamedica=1' UNION SELECT table_name FROM information_schema.tables WHERE table_schema=database()--&id=1
    

    This payload attempts to inject a UNION SELECT statement to retrieve table names from the information_schema.tables table.

  3. The attacker sends the malicious URL to the server.

  4. The server executes the injected SQL query, potentially revealing sensitive database information.

  5. The attacker can then use the retrieved information to further exploit the database, such as extracting data from specific tables or modifying data.

Real-World Impact:

  • Data Breach: Attackers can steal sensitive patient data, including personal information, medical records, and financial details.
  • Data Manipulation: Attackers can modify or delete patient records, leading to incorrect medical treatments or denial of services.
  • System Downtime: Attackers can inject SQL queries that cause the database server to crash, leading to system downtime and disruption of services.
  • Reputational Damage: A successful attack can damage the reputation of the charitable institution, leading to loss of trust and funding.

Mitigation Strategies

To mitigate the risk of CVE-2025-30367, the following strategies are recommended:

  1. Upgrade to Version 3.2.6 or Later: The most effective mitigation is to upgrade WeGIA to version 3.2.6 or later, which contains the patch for this vulnerability.
  2. Input Validation and Sanitization: Implement strict input validation and sanitization for all user-supplied input, especially parameters used in SQL queries. Use parameterized queries or prepared statements to prevent SQL injection.
  3. Output Encoding: Encode all output data before displaying it to the user to prevent Cross-Site Scripting (XSS) attacks. Use functions like htmlspecialchars() to escape special characters.
  4. Web Application Firewall (WAF): Deploy a WAF to detect and block malicious requests, including SQL injection attempts. Configure the WAF with rules to filter out suspicious patterns and payloads.
  5. Regular Security Audits: Conduct regular security audits and penetration testing to identify and address vulnerabilities in the application.
  6. Least Privilege Principle: Grant database users only the necessary privileges to perform their tasks. Avoid using the root user for application connections.
  7. Database Monitoring: Monitor database activity for suspicious queries and access patterns. Set up alerts for unusual behavior.
  8. Regular Backups: Maintain regular backups of the database to ensure data can be restored in case of a successful attack.

Configuration Changes:

  • Review and update the application's configuration to ensure that all security settings are properly configured.
  • Disable unnecessary features and services to reduce the attack surface.
  • Implement strong password policies for all user accounts.

Security Best Practices:

  • Follow secure coding practices to prevent common vulnerabilities.
  • Keep all software and systems up to date with the latest security patches.
  • Educate users about phishing and other social engineering attacks.
  • Implement a comprehensive security awareness program for all employees.

Timeline of Discovery and Disclosure

  • 2025-03-21: Vulnerability reported.
  • 2025-03-27: Patch released in WeGIA version 3.2.6.
  • 2025-03-27: CVE-2025-30367 publicly disclosed.

References

This blog post provides a comprehensive analysis of CVE-2025-30367, including technical details, root cause analysis, patch analysis, exploitation techniques, and mitigation strategies. By understanding the vulnerability and implementing the recommended mitigations, organizations can protect their WeGIA installations from potential attacks.

Read more